Keyword: worm_bropia
11018 Total Search   |   Showing Results : 541 - 560
This worm arrives as attachment to mass-mailed email messages. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It also has rootkit
This worm arrives by connecting affected removable drives to a system. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It drops
This worm searches for folders in the removable drives and creates shortcut links as {folder name}.LNK . The attributes of all the folders found on the drive are changed to Hidden . This worm arrives
below. This worm is also capable of performing denial of service (DoS) attacks on target systems. It receives commands from a remote server that is controlled by a malicious user to perform SYN flood
EXPL_CPLNK.SM. This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It
This worm also searches for files with certain extension names and drops lnk files with the names of the searched files which are shortcuts to the dropped copy in all removable and network drives.
This worm drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. Installation
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites. It modifies registry entries to hide
This worm arrives by connecting affected removable drives to a system. It arrives via removable drives. It modifies registry entries to hide files with System and Read-only attributes. It drops an
This worm arrives by connecting affected removable drives to a system. It arrives by accessing affected shared networks. It may be dropped by other malware. It may be unknowingly downloaded by a user
This worm drops copies of itself in all removable and physical drives found in the system. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of
This worm may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It drops copies of itself into network drives. It also has rootkit
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It drops an AUTORUN.INF file to automatically
This worm joins an Internet Relay Chat (IRC) channel. It executes commands from a remote malicious user, effectively compromising the affected system. It steals CD keys, serial numbers, and/or the
This worm arrives by connecting affected removable drives to a system. It drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops
This worm attempts to connect to certain URLs. Once a connection is established, it waits for commands from the remote user. This worm arrives via removable drives. It may be unknowingly downloaded
that executes this Javascript every 4 hours. It may also connect to IRC servers and receive commands from a remote user. This worm may be dropped by other malware. It may be unknowingly downloaded by a
every system startup. This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites.
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It drops copies of itself into all the removable
peer-to-peer network which may then receive and send commands from/to other infected machines/malicious networks to download and execute other malicious files. This worm may be dropped by other malware. It may